Understanding the European NIS Directive

The European Cybersecurity policy - the Network Information Security (NIS) Directive - is about to become the new law that sets security standards for many organisations across Europe.

Recent research carried out by FireEye shows that many organisations are not fully prepared to implement the legislation, which comes into effect in less than two years' time, and it is critical these organisations begin preparing now to be in compliance and not be caught unprepared.

Aside from breaches, ransomware attacks, and insider threats, another large issue faced by the cyber security industry is diversity, or lack thereof.

Making the industry more appealing to women and then eventually retaining female talent are both challenges that are still affecting the cyber workforce.

Join this panel where we'll hear from experts who have made successful careers out of their time in the cyber security sector. They will discuss:

-How did they make their first break?
-Why does the industry have such a hard time retaining talent?
-What are some of their favourite parts about their job?
-Their advice to women in the industry
-Their advice to cyber security execs looking to create more diverse teams

Repeated high-profile breaches, disruptive attacks and global crime with indicators of sponsorship by North Korea demonstrate an increasing threat and underscore the necessity of tracking the activity of their hackers.

APT37 is less well-recognized than other threat actors sponsored by North Korea, but their increasing global activity and recent use of a zero-day exploit can no longer be ignored by network defenders.

FireEye has tracked APT37 since 2015 as TEMP.Reaper and shared details on its activities with our intelligence customers. Over time we have come to better understand APT37. On Thursday, February 28, join Ben Read, Senior Manager, Cyber Espionage at FireEye for our unique insights into APT37:

• A history of APT37 support for North Korean interests
• Details on the malware suite employed by APT37
• How APT37 has been influencing the world beyond the Korean peninsula

2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

Join us for a live webinar, as David Grout, Southern Europe Systems Engineering Director with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

•Continued political tension in the region
•Upcoming elections
•Mixed security maturity
•The effect of new compliance and data protection laws

Register today to learn what lies ahead, and stay one step ahead of cyber security threats.

Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

Join this live webinar in Arabic as we will discuss the following topics:
- FireEye Adaptive Defense
- Technology
- Intelligence
- Expertise

2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

•Continued political tension in the region
•Upcoming elections
•Mixed security maturity
•The effect of new compliance and data protection laws

Register today to learn what lies ahead, and stay one step ahead of cyber security threats.

2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.

This interactive Q&A panel will discuss:
- The trends shaping the cyber threat landscape in 2018
- Lessons from the biggest cyber events of the year
- Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
- The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams

From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyber attacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organization.
2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyber attacks.

Join us for a live webinar as we discuss:
- The most severe cybercriminal activities of 2017
- The motivations, approaches and TTPs of the threat groups behind these attacks
- Insights into APT10, APT32 & APT33

In this technical session we hear from an orchestration expert on best practices to simplify and automate security tools and processes. We will look at real-life examples of providing teams with greater control of incident response process for improved efficiency, thus saving time & resources and increasing efficiency and performance. We will also look at orchestration services with incident response playbooks, plug-in development, automation and workflow deployment.

Endpoint security has long been an obvious necessity, but mostly proved a resource heavy burden with limited value. The threat landscape has changed and so have the attack vectors. Endpoints are a popular and often easy in to customer networks. This ideal stepping stone needs proper protection and NGAV is no longer sufficient. Privacy laws and regulations demand answers quickly when things go south and data breaches occur. The endpoint is usually a good starting point to provider answers to questions like:

- Is there command and control activity?
- Did lateral movement occur?
- What other systems were accessed?
- Et cetera…

This webinar explains how FireEye Endpoint Security (HX) helps our customer to protect their endpoints, and enable you to go from alert to fix in a matter of minutes. Visibility, speed and cost efficiency are the key components in this solution.

After this webinar, you will have good understanding of the capabilities on countering attacks on your endpoints, and how Fireeye’s Endpoint Security can be of added value to your organisation.

Cloud adoption is a reality today, every company is moving applications and businesses in the cloud to get more flexibility, agility and to potentially reduce their costs.

Security operations need to enable this transformation and help the business to activate capabilities in the cloud infrastructure. Risks exist and cannot be ignored if companies want to provide a sustainable and secure environment for themselves and their customers.

During this webinar, we will describe the main risks associated with cloud adoption and cover how to mitigate those risks.

Identifying effective threat intelligence is not easy. Learn what it means to have timely, relevant and actionable threat intelligence and how it can help you respond to threats quickly and decisively.

This webinar explains:

· Why do organisations require Cyber threat intelligence?
o To aid technical and business decision making
o To identify and manage risks
o To efficiently deploy capital against the threats that matter to enterprise

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organisations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 6,000 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.